Proceedings of the 8th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2015
DOI: 10.1145/2766498.2766512
|View full text |Cite
|
Sign up to set email alerts
|

A practical investigation of identity theft vulnerabilities in Eduroam

Abstract: Eduroam offers secure access to the Internet at participating institutions, using authentication via IEEE 802.1X and secure forwarding of authentication data to the authentication server of the user's institution. Due to erroneous configuration manuals and a lack of knowledge on the user side, though, a big share of client devices lack the required root CA certificate to authenticate the Eduroam network, yet still being able to access the network. Moreover, deficient software implementations on client devices … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
21
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(23 citation statements)
references
References 18 publications
2
21
0
Order By: Relevance
“…Techniques for attacking WPA2 Enterprise supplicants that are not configured appropriately are widely known (e.g., [16,2,8,11,7]). These techniques are not a weakness of the WPA2 Enterprise family of protocols: they are an obvious consequence of using those protocols without satisfying their basic requirements.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Techniques for attacking WPA2 Enterprise supplicants that are not configured appropriately are widely known (e.g., [16,2,8,11,7]). These techniques are not a weakness of the WPA2 Enterprise family of protocols: they are an obvious consequence of using those protocols without satisfying their basic requirements.…”
Section: Discussionmentioning
confidence: 99%
“…Satisfying this requirement is extremely important. Supplicants that are not correctly configured, i.e., that do not know the DNS name of the authorization server for the enterprise network, may be easily tricked into starting an execution of the authentication protocol with an evil twin, a malicious access point that broadcasts the SSID of the enterprise network (e.g., [16,2,8,11,7]). In most configurations the protocol execution will fail, because the evil twin will not be able to authenticate itself to the supplicant as required by WPA2 Enterprise.…”
Section: Introductionmentioning
confidence: 99%
“…If one of the RADIUS servers in the hierarchy is down, this impacts the overall service. Identity theft vulnerabilities and MITM (Man-in-the-Middle) attacks in Eduroam have been investigated in [26], along with some possible countermeasures. Other authors [27] proposed to enhance Eduroam security via a new trust hierarchy based on RA-DIUS/TLS [28], while Liu et al [29] proposed a scheme aimed to improve Eduroam stability and performance.…”
Section: B Login and Wi-fi Access Services: Existing Solutions And Imentioning
confidence: 99%
“…In theory, the users do not connect to rogue APs if the supplicant checks the validity of the offered certificate of the authentiaction server. However, in practice, some older versions of wpa supplicant do not check the validity of the authentication servers' certificates [19]. Even if the supplicant can check the validity, some users might accept invalid certificates.…”
Section: Security Analysismentioning
confidence: 99%